{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:41:21Z","timestamp":1761676881515,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/cns48642.2020.9162298","type":"proceedings-article","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T21:54:40Z","timestamp":1596837280000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses"],"prefix":"10.1109","author":[{"given":"Luan Huy","family":"Pham","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Albanese","sequence":"additional","affiliation":[]},{"given":"Ritu","family":"Chadha","sequence":"additional","affiliation":[]},{"given":"Cho-Yu J.","family":"Chiang","sequence":"additional","affiliation":[]},{"given":"Sridhar","family":"Venkatesan","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Kamhoua","sequence":"additional","affiliation":[]},{"given":"Nandi","family":"Leslie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"An analysis of the Shamoon 2 malware attack","year":"2017","author":"morales","key":"ref10"},{"journal-title":"Python Passive Network Mapping P2NMAP Syngress","year":"2015","author":"hosmer","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2017.02.01"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663483"},{"key":"ref14","article-title":"Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","author":"hutchins","year":"2010","journal-title":"Lockheed Martin Corporation Tech Rep"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795481"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795383"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.37"},{"key":"ref19","first-page":"80","article-title":"Generating test data for insider threat detectors","volume":"5","author":"lindauer","year":"2014","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"journal-title":"Technical report Ponemon Institute","article-title":"2017 cost of a data breach study","year":"2017","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599754"},{"key":"ref5","first-page":"282","article-title":"A quantitative framework to model advanced persistent threats","author":"pham","year":"2018","journal-title":"15th International Conference on Security and Cryptography (SECRYPT 2018)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997517"},{"journal-title":"ATT&CK MITRE","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.005"},{"key":"ref1","article-title":"To kill a centrifuge: A technical analysis of what stuxnet&#x2019;s creators tried to achieve","author":"langner","year":"2013","journal-title":"The Langner Group Tech Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587326"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633039"}],"event":{"name":"2020 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2020,6,29]]},"location":"Avignon, France","end":{"date-parts":[[2020,7,1]]}},"container-title":["2020 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9153729\/9162157\/09162298.pdf?arnumber=9162298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:57:31Z","timestamp":1656345451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cns48642.2020.9162298","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}